Analysis
-
max time kernel
121s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 00:03
Static task
static1
Behavioral task
behavioral1
Sample
emotet_exe_e2_2bffe5e50c10299a36490f0c0ab76c4b31acbd111e52684bb141d1bc267493ae_2021-01-13__000248.exe.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_exe_e2_2bffe5e50c10299a36490f0c0ab76c4b31acbd111e52684bb141d1bc267493ae_2021-01-13__000248.exe.dll
Resource
win10v20201028
General
-
Target
emotet_exe_e2_2bffe5e50c10299a36490f0c0ab76c4b31acbd111e52684bb141d1bc267493ae_2021-01-13__000248.exe.dll
-
Size
269KB
-
MD5
2c177c13a67a7a8ce5e2c5a0312e3223
-
SHA1
1158b27db357ba36fc3922d0f85d7be3ab3f3aa7
-
SHA256
2bffe5e50c10299a36490f0c0ab76c4b31acbd111e52684bb141d1bc267493ae
-
SHA512
8a0684acf5ac3d079104a6684c0ab1d32728008295417b36f56572178e83ba08ca47ce31a1a0f9d47b79ec8b4036c7437b3ff8d5e79cf5b2ebbfeb1d1b063925
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 6 1660 rundll32.exe 7 1660 rundll32.exe 10 1660 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
rundll32.exepid process 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1728 wrote to memory of 1660 1728 rundll32.exe rundll32.exe PID 1728 wrote to memory of 1660 1728 rundll32.exe rundll32.exe PID 1728 wrote to memory of 1660 1728 rundll32.exe rundll32.exe PID 1728 wrote to memory of 1660 1728 rundll32.exe rundll32.exe PID 1728 wrote to memory of 1660 1728 rundll32.exe rundll32.exe PID 1728 wrote to memory of 1660 1728 rundll32.exe rundll32.exe PID 1728 wrote to memory of 1660 1728 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\emotet_exe_e2_2bffe5e50c10299a36490f0c0ab76c4b31acbd111e52684bb141d1bc267493ae_2021-01-13__000248.exe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\emotet_exe_e2_2bffe5e50c10299a36490f0c0ab76c4b31acbd111e52684bb141d1bc267493ae_2021-01-13__000248.exe.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1660
-